An additional layer of security for businesses and smart systems
Today’s businesses and smart systems developers face four critical areas of IT security:
- Threat management, including protection from malicious attacks, software and viruses
- Identity and website access point protection
- Protection of personal and business confidential data
- Computers and business remote and local monitoring and repair of stations
Intel® vPro™ technology answers these needs with comprehensive security, manageability and productivity features. This technology is integrated in the new Intel® Core™ vPro™ processor family, Intel® Xeon® E5-2600, E5-1600 and E3-1200 processor product family, Intel® chipsets and network adapters that facilitate and accelerate these four critical IT functions.
Intel vPro technology is appropriately integrated, but deployment of some of its unique features may require additional work depending on the organization’s needs and policies. Thanks to Intel® Setup and Configuration Software 9.0, IT administrators can deploy Intel vPro processor-based computers or workstations in minutes.
Prevent attacks from damaging the operating system
Intel vPro technology, It provides protection against hard-to-detect, system-infiltrating malicious attacks and malware that threatens users working in cloud and virtual environments. It combines many hardware-based features including Intel® Trusted Execution Technology (Intel® TXT) and Intel Virtualization Technology (Intel® VT)4 for centralized image management, secure network storage and out-of-band protection, all beyond the firewall.
Protect your confidential information
Traditional account verification methods are no longer enough. That’s why Intel vPro technology offers many integrated lines of defense, starting with the online security features of Intel® Identity Protection Technology (Intel® IPT), embedded disposable passwords, integrated public key infrastructure (PKI), and protected transaction display.
The Intel® AES New Instructions6 standard provides additional protection and can encrypt data four times faster without affecting user productivity.7 The technology features hardware-based encryption Intel® Secure Key8 technology that generates high-quality random numbers and offers more reliable data encryption possibilities for safer interactions.
Quick solution against all security breaches
As Intel vPro technology is embedded in hardware, its capabilities; can be accessed and managed in the pre-boot environment independent of the hard drive, operating system, and software applications. Thus, management is less affected by problems in these areas.. It offers remote access to the computer or workstation regardless of the power state of the system or the state of the operating system.
Prepared by Murat Nalcı